Photo of Patrick Mcdaniel

Patrick Mcdaniel

Distinguished Professor

Affiliation(s):

  • School of Electrical Engineering and Computer Science
  • Computer Science and Engineering

W329 Westgate Building

pdm12@psu.edu

814-863-3599

Personal or Departmental Website

Research Areas:

Interest Areas:

Systems and network security, security policy, networking, distributed systems, public policy, network management, applied cryptography, privacy.

 
 

 

Education

  • BS, Computer Science, Ohio State University, 1989
  • MS, Ball State University, 1991
  • MA, Computer Science and Engineering, University of Michigan, 2001

Publications

Books

  • Patrick Traynor, Patrick D McDaniel and Thomas F Laporta, 2008, Security for Telecommunications Networks, Springer, pp. 182 pages
  • , 2005, Encyclopedia of Cryptography and Security, Springer

Book, Chapters

  • K Butler, W Enck, P Traynor, J Plasterr and Patrick D McDaniel, 2008, Privacy Preserving Web-Based Email
  • Patrick D McDaniel, 2007, Authentication, John Wiley and Sons, Inc
  • Patrick D McDaniel, 2005, IPsec
  • Patrick D McDaniel, 2005, Policy
  • Patrick D McDaniel, 2004, Computer and Network Authentication, John Wiley and Sons Inc
  • Patrick D McDaniel, 2003, Encyclopedia of Information Security, Kluwer Academic Publishers
  • Patrick D McDaniel, 2002, The Internet Encyclopedia, John Wiley and Sons, Inc

Journal Articles

  • D. J. and Patrick D McDaniel, 2016, "Modeling Privacy and Tradeoffs in Multichannel Secret Sharing Protocols"
  • Patrick D McDaniel, Nicolas Papernot and Z. Berkay Celik, 2016, "Machine Learning in Adversarial Settings", IEEE Security & Privacy, 14, (3), pp. 68–72
  • Patrick D McDaniel and A. Swami, 2016, "The Cyber Security Collaborative Research Alliance: Unifying Detection, Agility, and Risk in Mission-Oriented Cyber Decision Making", CSIAC Journal, Army Research Laboratory (ARL) Cyber Science and Technology
  • Patrick D McDaniel, 2016, "Composite Constant Propagation and its Application to Android Program Analysis", IEEE Transactions on Software Engineering
  • Nicolas Papernot, Patrick D McDaniel, Xi Wu, Somesh Jha and Ananthram Swami, 2015, "Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks", CoRR, abs/1511.04508
  • Alexander Kott, Ananthram Swami and Patrick D McDaniel, 2015, "Six Potential Game-Changers in Cyber Security: Towards Priorities in Cyber Science and Engineering", CoRR, abs/1511.00509
  • Nicolas Papernot, Patrick D McDaniel, Somesh Jha, Matt Fredrikson, Z. Berkay Celik* and Ananthram Swami, 2015, "The Limitations of Deep Learning in Adversarial Settings", CoRR, abs/1511.07528
  • Alexander Kott, Ananthram Swami and Patrick D McDaniel, 2014, "Security Outlook: Six Cyber Game Changers for the Next 15 Years", IEEE Computer, 47, (12), pp. 104–106
  • William Enck, Peter Gilbert, Seungyeop Han, Vasant Tendulkar, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick D McDaniel and Anmol N. Sheth, 2014, "TaintDroid: An Information-Flow Tracking System for Realtime PrivacyMonitoring on Smartphones", ACM Transactions on Computer Systems, 32, (2), pp. 5
  • William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick D McDaniel and Anmol Sheth, 2014, "TaintDroid: an information flow tracking system for real-time privacymonitoring on smartphones", Communications of the ACM, 57, (3), pp. 99–106
  • Zhenfu Cao, Keqiu Li, Xu Li, Patrick D McDaniel, Radha Poovendran, Guojun Wang and Yang Xiang, 2014, "Guest Editors’ Introduction: Special Issue on Trust, Security, andPrivacy in Parallel and Distributed Systems", IEEE Trans. Parallel Distrib. Syst., 25, (2), pp. 279–282
  • Li Li, Alexandre Bartel, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau* and Patrick D McDaniel, 2014, "I know what leaked in your pocket: uncovering privacy leaks on AndroidApps with Static Taint Analysis", CoRR, abs/1404.7431
  • William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick D McDaniel and Anmol Sheth, 2014, "TaintDroid: an information flow tracking system for real-time privacymonitoring on smartphones", Communications of the ACM, 57, (3), pp. 99–106
  • William Enck, Peter Gilbert, Seungyeop Han, Vasant Tendulkar, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick D McDaniel and Anmol N. Sheth, 2014, "TaintDroid: An Information-Flow Tracking System for Realtime PrivacyMonitoring on Smartphones", ACM Transactions on Computer Systems, 32, (2), pp. 5:1–5:29
  • Li Li, Alexandre Bartel, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau and Patrick D McDaniel, 2014, "I know what leaked in your pocket: uncovering privacy leaks on AndroidApps with Static Taint Analysis", CoRR, abs/1404.7431
  • Patrick D McDaniel, Brian Rivera and Ananthram Swami, 2014, "Toward a Science of Secure Environments", IEEE Security & Privacy, 12, (4), pp. 68–70
  • M. Ongtang*, S. McLaughlin*, W. Enck* and Patrick D McDaniel, 2012, "Semantically Rich Application-Centric Security in Android", Security and Communication Networks, 5, (6), pp. 658-673
  • Patrick D McDaniel, 2012, "Bloatware Comes to the Smartphone", IEEE Security & Privacy, 10, (4), pp. 85–87
  • P. Traynor*, C. Amrutkar, V. Rao, T. Jaeger, Patrick D McDaniel and T. F. La Porta, 2011, "From Mobile Phones to Responsible Devices", Journal of Security and Communication Networks (SCN), 4, (6), pp. 719-726
  • T Moyer*, K Butler*, J Schiffman, Patrick D McDaniel and Trent R Jaeger, 2011, "Scalable Web Content Attestation", IEEE Transactions on Computers, pp. 15
  • Patrick D McDaniel, 2011, "Data Provenance and Security", IEEE Security & Privacy Magazine, 9, (2), pp. 83-85
  • J. Schiffman, T. Jaeger and Patrick D McDaniel, 2011, "Network-based Root of Trust for Installation", IEEE Security & Privacy Magazine, 9, (1), pp. 40-48
  • Kevin Butler*, Stephen E. McLaughlin*, Thomas Moyer* and Patrick D McDaniel, 2010, "New Security Architectures Based on Emerging Disk Functionality", IEEE Security & Privacy, 8, (5), pp. 34–41
  • Patrick D McDaniel and William Enck*, 2010, "Not So Great Expectations: Why Application Markets Haven't Failed Security", IEEE Security & Privacy, 8, (5), pp. 76–78
  • Boniface Hicks*, Sandra Rueda, Luke St. Clair*, Trent R Jaeger and Patrick D McDaniel, 2010, "A logical specification and analysis for SELinux MLS policy", ACM Transactions on Information and System Security, 13, (3)
  • Patrick Traynor*, Kevin Butler*, William Enck*, Patrick D McDaniel and Kevin Borders, 2010, "malnets: large-scale malicious networks via compromised wireless access points", Security and Communication Networks, 3, (2-3), pp. 102–113
  • Kevin Butler*, Toni R. Farley, Patrick D McDaniel and Jennifer Rexford, 2010, "A Survey of BGP Security Issues and Solutions", Proceedings of the IEEE, 98, (1), pp. 100–122
  • Matthew Pirretti, Patrick Traynor*, Patrick D McDaniel and Brent Waters, 2010, "Secure attribute-based systems", Journal of Computer Security, 18, (5), pp. 799–837
  • Kevin R. B. Butler*, Sunam Ryu, Patrick Traynor* and Patrick D McDaniel, 2009, "Leveraging Identity-Based Cryptography for Node ID Assignment inStructured P2P Systems", IEEE Transactions on Parallel and Distributed Systems (TPDS), 20, (12), pp. 1803–1815
  • Heesook Choi, William Enck, Jaesheung Shin, Patrick D McDaniel and Thomas F Laporta, 2009, "ASR: anonymous and secure reporting of traffic forwarding activityin mobile ad hoc networks", ACM Wireless Networks (WINET), 15, (4), pp. 525–539
  • Patrick D McDaniel and Stephen E. McLaughlin, 2009, "Security and Privacy Challenges in the Smart Grid", IEEE Security & Privacy, 7, (3), pp. 75–77
  • W Enck, T Moyer, Patrick D McDaniel, S Sen, P Sebos, S Spoerel, A Greenberg, Y W Sung, S Rao and W Aiello, 2009, "Configuration Management at Massive Scale: System Design and Experience", IEEE Journal on Selected Areas in Communications (JSAC), 27
  • Patrick Traynor, William Enck, Patrick D McDaniel and Thomas F Laporta, 2009, "Mitigating attacks on open functionality in SMS-capable cellular networks", IEEE/ACM Transactions on Networking, 17, (1), pp. 40–53
  • William Enck, Machigar Ongtang and Patrick D McDaniel, 2009, "Understanding Android Security", IEEE Security and Privacy Magazine, 7, (1), pp. 50–57
  • Patrick Traynor, William Enck, Patrick D McDaniel and Thomas F Laporta, 2008, "Exploiting open functionality in SMS-capable cellular networks", Journal of Computer Security, 16, (6), pp. 713–742
  • Patrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks and Patrick D McDaniel, 2008, "Noninvasive Methods for Host Certification", ACM Transactions on Information and System Security (TISSEC), 11, (3)
  • Patrick D McDaniel and Bashar Nuseibeh, 2008, "Guest Editors’ Introduction: Special Section on Software Engineeringfor Secure Systems", IEEE Transactions on Software Engineering, 34, (1), pp. 3–4
  • Wesam Lootah, William Enck and Patrick D McDaniel, 2007, "TARP: Ticket-based address resolution protocol", Computer Networks, 51, (15), pp. 4322–4337
  • Patrick D McDaniel, P Traynor, R Kumar, H Choi, G Cao, S Zhu and T F La Porta, 2007, "Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks", IEEE Transactions on Mobile Computing, 6, (6), pp. 663-677
  • Patrick D McDaniel and Atul Prakash, 2006, "Enforcing provisioning and authorization policy in the Antigone system", Journal of Computer Security, 14, (6), pp. 483–511
  • Patrick D McDaniel and Atul Prakash, 2006, "Methods and limitations of security policy reconciliation", ACM Transactions on Information and System Security (TISSEC), 9, (3), pp. 259–291
  • Patrick D McDaniel, William Aiello, Kevin R. B. Butler and John Ioannidis, 2006, "Origin authentication in interdomain routing", Computer Networks, 50, (16), pp. 2953–2980
  • Matthew Pirretti, Sencun Zhu, Vijaykrishnan Narayanan, Patrick D McDaniel, Mahmut T Kandemir and Richard R. Brooks, 2006, "The Sleep Deprivation Attack in Sensor Networks: Analysis and Methodsof Defense", International Journal of Distributed Sensor Networks, 2, (3), pp. 267–287
  • Patrick D McDaniel and Aviel D. Rubin, 2005, "Web security", Computer Networks, 48, (5), pp. 697–699
  • Patrick D McDaniel and A Rubin, 2005, "Guest Editorial", Computer Networks, Special Issue on Web Security
  • S Byers, L Cranor, E Cronin, D Korman and Patrick D McDaniel, 2004, "Analysis of Security Vulnerabilities in the Movie Production and Distribution Process", Telecommunications Policy, 28, (8), pp. 619-644
  • E Cronin, S Jamin, T Malkin and Patrick D McDaniel, 2003, "Analysis of Security Vulnerabilities in the Movie Production and Distribution Process"

Conference Proceedings

  • N. Lageman, E. Kilmer, R. J. Walls and Patrick D McDaniel, 2016, "BinDNN: Resilient Function Matching Using Deep Learning"
  • C. Lever, R. Walls, Y. Nadji, Patrick D McDaniel and D. Dagon, 2016, "Domain-Z: 28 Registrations Later"
  • Charles Huber, Patrick D McDaniel, Scott E. Brown and Lisa M. Marvel, 2016, "Cyber Fighter Associate: A Decision Support System for cyber agility", IEEE, pp. 198–203
  • Nicolas Papernot, Patrick D McDaniel, Somesh Jha, Matt Fredrikson, Z. Berkay Celik and Ananthram Swami, 2016, "The Limitations of Deep Learning in Adversarial Settings", IEEE, pp. 372–387
  • Z. B. Celik, N. Hu, Y. Li, N. Papernot, Patrick D McDaniel, J. Rowe, R. Walls, K. Levitt, K. Bartolini and R. Chadha, 2016, "Mapping Sample Scenarios to Operational Models"
  • N. Papernot, Patrick D McDaniel, A. Swami and R. Harang, 2016, "CraftingAdversarial Input Sequences for Recurrent Neural Networks."
  • Damien Octeau, Somesh Jha, Matthew Dering, Patrick D McDaniel, Alexandre Bartel, Li Li, Jacques Klein and Yves Le Traon, 2016, "Combining static analysis with probabilistic models to enable market-scale Android inter-component analysis", ACM, pp. 469–484
  • Y. Acar, M. Backes, S. Bugiel, S. Fahl, Patrick D McDaniel and P. D. Smith, 2016, "SoK: Lessons Learned From Android Security Research For Appified Software Platforms"
  • N. Papernot, Patrick D McDaniel, X. Wu, S. Jha and A. Swami, 2016, "Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks"
  • S. Achleitner, T. La Porta, Patrick D McDaniel, S. Sugrim, S. Krishnamurthy and R. Chadha, 2016, "Cyber Deception: Virtual Networks to Defend Insider Reconnaissance"
  • D. J. Pohly*, C. Sestito and Patrick D McDaniel, 2015, "Adaptive protocol switching using Dynamically Insertable Bumps in the stack", pp. 342-347
  • N. Papernot, Patrick D McDaniel and R. J. Walls, 2015, "Enforcing agile access control policies in relational databases using views", pp. 7-12
  • Z. Berkay Celik*, R. J. Walls, Patrick D McDaniel and A. Swami, 2015, "Malware traffic detection using tamper resistant features", pp. 330-335
  • A. Oltramari, L. F. Cranor, R. J. Walls and Patrick D McDaniel, 2015, "Computational ontology of network operations", pp. 318-323
  • A. Aqil, A. O. F. Atya, Trent R Jaeger, S. V. Krishnamurthy, K. Levitt, Patrick D McDaniel, J. Rowe and A. Swami, 2015, "Detection of stealthy TCP-based DoS attacks", pp. 348-353
  • Robert J. Walls, Eric D. Kilmer, Nathaniel Lageman and Patrick D McDaniel, 2015, "Measuring the Impact and Perception of Acceptable Advertisements", pp. 107–120
  • Li Li, Alexandre Bartel, Tegawendé F Bissyandé, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau and Patrick D McDaniel, 2015, "IccTA: Detecting Inter-Component Privacy Leaks in Android Apps"
  • Damien Octeau, Daniel Luchaup, Matthew Dering, Somesh Jha and Patrick D McDaniel, 2015, "Composite Constant Propagation: Application to Android Inter-Component Communication Analysis"
  • Daniel Krych, Stephen Lange-Maney, Patrick D McDaniel and William Glodek, 2015, "Investigating weaknesses in Android certificate security"
  • Jing (Dave) Tian, Kevin R. B. Butler, Patrick D McDaniel and Padma Krishnaswamy, 2015, "Securing ARP From the Ground Up", ACM, pp. 305–312
  • Patrick D McDaniel, 2015, "A New Science of Security Decision Making", pp. IS–13
  • Alessandro Oltramari, Lorrie Faith Cranor, Robert J. Walls and Patrick D McDaniel, 2014, "Building an Ontology of Cyber Security", pp. 6
  • Matthew Dering* and Patrick D McDaniel, 2014, "Android market reconstruction and analysis", pp. 300-305
  • Wenhui Hu*, Damien Octeau*, Patrick D McDaniel and Peng Liu, 2014, "Duet: library integrity verification for android applications", ACM, pp. 141–152
  • Steven Arzt, Siegfried Rasthofer, Christian Fritz, Eric Bodden, Alexandre Bartel, Jacques Klein, Yves Le Traon, Damien Octeau* and Patrick D McDaniel, 2014, "FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps", pp. 29
  • Philip Koshy*, Diana Koshy* and Patrick D McDaniel, 2014, "An Analysis of Anonymity in Bitcoin Using P2P Network Traffic", Springer-Verlag LNCS, 8437, pp. 469–485
  • Stephen E. McLaughlin*, Saman A. Zonouz, Devin J. Pohly* and Patrick D McDaniel, 2014, "A Trusted Safety Verifier for Process Controller Code", The Internet Society, pp. 15
  • Damien Octeau*, Patrick D McDaniel, Somesh Jha, Alexandre Bartel, Eric Bodden, Jacques Klein and Yves Le Traon, 2013, "Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis", pp. 543–558
  • Devin J. Pohly*, Stephen E. McLaughlin*, Patrick D McDaniel and Kevin Butler*, 2012, "Hi-Fi: collecting high-fidelity whole-system provenance", pp. 259–268
  • Weining Yang, Ninghui Li, Yuan Qi, Wahbeh H. Qardaji, Stephen E. McLaughlin* and Patrick D McDaniel, 2012, "Minimizing private data disclosures in the smart grid", pp. 415–427
  • Damien Octeau*, Somesh Jha and Patrick D McDaniel, 2012, "Retargeting Android applications to Java bytecode", pp. 6
  • Stephen E. McLaughlin* and Patrick D McDaniel, 2012, "SABOT: specification-based payload generation for programmable logic controllers", pp. 439–449
  • Eun-Kyoung Kim, Patrick D McDaniel and Thomas F Laporta, 2012, "A Detection Mechanism for SMS Flooding Attacks in Cellular Networks", pp. 76–93
  • Thomas Moyer*, Trent R Jaeger and Patrick D McDaniel, 2012, "Scalable Integrity-Guaranteed AJAX", pp. 1–19
  • Stephen E. McLaughlin*, Patrick D McDaniel and William Aiello, 2011, "Protecting consumer privacy from electric load monitoring", pp. 87–98
  • William Enck*, Damien Octeau*, Patrick D McDaniel and Swarat Chaudhuri, 2011, "A Study of Android Application Security"
  • M Ongtang*, Joshua Schiffman, Thomas F Laporta, Patrick D McDaniel, Abhrajit Ghosh and F Anjum, 2010, "Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware", pp. 6
  • Kevin R. B. Butler*, Stephen E. McLaughlin* and Patrick D McDaniel, 2010, "Kells: a protection framework for portable data", pp. 231–240
  • Stephen E. McLaughlin*, Dmitry Podkuiko*, Sergei Miadzvezhanka*, Adam Delozier* and Patrick D McDaniel, 2010, "Multi-vendor penetration testing in the advanced metering infrastructure", pp. 107–116
  • Machigar Ongtang*, Kevin Butler* and Patrick D McDaniel, 2010, "Porscha: policy oriented secure content handling in Android", pp. 221–230
  • Kevin R. B. Butler*, Stephen E. McLaughlin* and Patrick D McDaniel, 2010, "Protecting portable storage with host validation", pp. 651–653
  • Joshua Schiffman, Thomas Moyer*, Hayawardh Vijayakumar, Trent R Jaeger and Patrick D McDaniel, 2010, "Seeding clouds with trust anchors", pp. 43–46
  • William Enck*, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick D McDaniel and Anmol Sheth, 2010, "TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones", pp. 393–407
  • Toby Ehrenkranz, Jun Li and Patrick D McDaniel, 2010, "Realizing a Source Authentic Internet", pp. 217–234
  • Stephen E. McLaughlin*, Dmitry Podkuiko*, Adam Delozier*, Sergei Miadzvezhanka* and Patrick D McDaniel, 2010, "Embedded Firmware Diversity for Smart Electric Meters"
  • Boniface Hicks*, Sandra Rueda Rodreguez, Dave King, Thomas Moyer*, Joshua Schiffman, Yogesh Sreenivasan, Patrick D McDaniel and Trent R Jaeger, 2010, "An architecture for enforcing end-to-end access control over web applications", pp. 163–172
  • Kevin R. B. Butler*, Stephen E. McLaughlin* and Patrick D McDaniel, 2010, "Disk-enabled authenticated encryption", pp. 1–6
  • Patrick D McDaniel, Kevin R. B. Butler*, Stephen E. McLaughlin*, Erez Zadok, Radu Sion and Marianne Winslett, 2010, "Towards a Secure and Efficient System for End-to-End Provenance", pp. 5
  • Thomas Moyer*, Kevin R. B. Butler*, Joshua Schiffman, Patrick D McDaniel and Trent R Jaeger, 2009, "Scalable Web Content Attestation", pp. 95–104
  • Machigar Ongtang, Stephen E. McLaughlin, William Enck and Patrick D McDaniel, 2009, "Semantically Rich Application-Centric Security in Android", pp. 340–349
  • J. Schiffman, T. Moyer*, C. Shal, Trent R Jaeger and Patrick D McDaniel, 2009, "Justifying Integrity Using a Virtual Machine Verifier", pp. 83-92
  • T. La Porta, Patrick D McDaniel, K. Rauscher and J. Shu, 2009, "The Impact of Supply Chain on Information and Communications Technology Security", pp. 7
  • Patrick Traynor, Michael Lin, Machigar Ongtang, Vikhyath Rao, Trent R Jaeger, Thomas F Laporta and Patrick D McDaniel, 2009, "On cellular botnets: measuring the impact of malicious devices ona cellular network core", pp. 223–234
  • William Enck, Machigar Ongtang and Patrick D McDaniel, 2009, "On lightweight mobile phone application certification", pp. 235–245
  • Stephen E. McLaughlin, Dmitry Podkuiko and Patrick D McDaniel, 2009, "Energy Theft in the Advanced Metering Infrastructure", pp. 176–187
  • Matt Blaze and Patrick D McDaniel, 2009, "Below the Salt: The Dangers of Unfulfilled Physical Media Assumptions", pp. 24–27
  • William Enck, Kevin R. B. Butler, Thomas Richardson, Patrick D McDaniel and Adam D Smith, 2008, "Defending Against Attacks on Main Memory Persistence", pp. 65–74
  • William Enck, Patrick D McDaniel and Trent R Jaeger, 2008, "PinUP: Pinning User Files to Known Applications", pp. 55–64
  • Kevin R. B. Butler, Stephen E. McLaughlin and Patrick D McDaniel, 2008, "Rootkit-resistant disks", pp. 403–416
  • Kevin R. B. Butler, William Enck, Harri Hursti, Stephen E. McLaughlin, Patrick Traynor and Patrick D McDaniel, 2008, "Systemic Issues in the Hart InterCivic and Premier Voting Systems:Reflections on Project EVEREST"
  • Patrick Traynor, Kevin R. B. Butler, William Enck and Patrick D McDaniel, 2008, "Realizing Massive-Scale Conditional Access Systems Through Attribute-BasedCryptosystems"
  • Dhananjay Bapat, Kevin R. B. Butler and Patrick D McDaniel, 2007, "Towards Automated Privilege Separation", pp. 272–276
  • Boniface Hicks, Tim Misiak and Patrick D McDaniel, 2007, "Channels: Runtime System Infrastructure for Security-Typed Languages", pp. 443–452
  • Luke St. Clair, Joshua Schiffman, Trent R Jaeger and Patrick D McDaniel, 2007, "Establishing and Sustaining System Integrity via Root of Trust Installation", pp. 19–29
  • Kevin R. B. Butler, Stephen E. McLaughlin and Patrick D McDaniel, 2007, "Non-volatile memory and disks: avenues for policy architectures", pp. 77–84
  • P Traynor, Patrick D McDaniel and T F La Porta, 2007, "On Attack Causality in Internet-Connected Cellular Networks", pp. 307-322
  • Lisa Johansen, Michael Rowell, Kevin R. B. Butler and Patrick D McDaniel, 2007, "Email Communities of Interest"
  • Anusha Sriraman, Kevin R. B. Butler, Patrick D McDaniel and Padma Raghavan, 2007, "Analysis of the IPv4 Address Space Delegation Structure", pp. 501–508
  • Boniface Hicks, Sandra Rueda, Luke St. Clair, Trent R Jaeger and Patrick D McDaniel, 2007, "A logical specification and analysis for SELinux MLS policy", pp. 91–100
  • William Enck, Patrick D McDaniel, Subhabrata Sen, Panagiotis Sebos, Sylke Spoerel, Albert G. Greenberg, Sanjay G. Rao and William Aiello, 2007, "Configuration Management at Massive Scale: System Design and Experience", pp. 73–86
  • Boniface Hicks, Sandra Rueda, Trent R Jaeger and Patrick D McDaniel, 2007, "From Trusted to Secure: Building and Executing Applications That EnforceSystem Security", pp. 205–218
  • Boniface Hicks, Dave King and Patrick D McDaniel, 2007, "Jifclipse: development tools for security-typed languages", pp. 1–10
  • Heesook Choi, Thomas F Laporta and Patrick D McDaniel, 2007, "Privacy Preserving Communication in MANETs", pp. 233–242
  • William Enck, Sandra Rueda, Joshua Schiffman, Yogesh Sreenivasan, Luke St. Clair, Trent R Jaeger and Patrick D McDaniel, 2007, "Protecting users from "themselves"", pp. 29–36
  • Sophie Y. Qiu, Patrick D McDaniel and Fabian Monrose, 2007, "Toward Valley-Free Inter-domain Routing", pp. 2009–2016
  • H. Rowaihy, W. Enck, Patrick D McDaniel and T. F. LaPorta, 2007, "Limiting Sybil Attacks in Structured Peer-to-Peer Networks", Proceedings of the Twenty-Sixth Annual IEEE Conference on Computer Communications (INFOCOM 2007) Mini-Symposium on Security, Streaming, and Overlays, pp. 2596-2600
  • Sunam Ryu, Kevin R. B. Butler, Patrick Traynor and Patrick D McDaniel, 2007, "Leveraging Identity-Based Cryptography for Node ID Assignment inStructured P2P Systems", 1, pp. 519–524
  • Hosam Rowaihy, William Enck, Patrick D McDaniel and Thomas F Laporta, 2007, "Limiting Sybil Attacks in Structured P2P Networks", pp. 2596–2600
  • B Hicks, S Rueda, T Jaeger and Patrick D McDaniel, 2007, "Integration of SELinux and Security-typed Languages"
  • , 2007, "CEAS 2007 - The Fourth Conference on Email and Anti-Spam, 2-3 August 2007, Mountain View, California, USA"
  • Boniface Hicks, Kiyan Ahmadizadeh and Patrick D McDaniel, 2006, "From Languages to Systems: Understanding Practical Application Developmentin Security-typed Languages", pp. 153–164
  • Patrick Traynor, Kevin R. B. Butler, William Enck, Jennifer N Plasterr, S Weaver, J van Bremer and Patrick D McDaniel, 2006, "Privacy Preserving Web-Based Email", pp. 116–131
  • Matthew Pirretti, Patrick Traynor, Patrick D McDaniel and Brent Waters, 2006, "Secure attribute-based systems", pp. 99–112
  • Kevin R. B. Butler, William Aiello and Patrick D McDaniel, 2006, "Optimizing BGP security by exploiting path stability", pp. 298–310
  • Shiva Chaitanya, Kevin R. B. Butler, Anand Sivasubramaniam, Patrick D McDaniel and Murali Vilayannur, 2006, "Design, implementation and evaluation of security in iSCSI-based networkstorage systems", pp. 17–28
  • Patrick Traynor, William Enck, Patrick D McDaniel and Thomas F Laporta, 2006, "Mitigating attacks on open functionality in SMS-capable cellular networks", pp. 182–193
  • Patrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks and Patrick D McDaniel, 2006, "Non-Invasive Methods for Host Certification", pp. 1–10
  • Trent R Jaeger, Patrick D McDaniel, Luke St. Clair, Ramón Cáceres and Reiner Sailer, 2006, "Shame on Trust in Distributed Systems", pp. 19-24
  • Boniface Hicks, Dave King, Patrick D McDaniel and Michael Hicks, 2006, "Trusted declassification: : high-level policy for a security-typedlanguage", pp. 65–74
  • Sophie Y. Qiu, Patrick D McDaniel, Fabian Monrose and Aviel D. Rubin, 2006, "Characterizing Address Use Structure and Stability of Origin Advertisementin Inter-domain Routing", pp. 489–496
  • , 2006, "Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings", Springer, 4332
  • Patrick D McDaniel, Subhabrata Sen, Oliver Spatscheck, Jacobus E. van der Merwe, William Aiello and Charles R. Kalmanek, 2006, "Enterprise Security: A Community of Interest Based Approach", pp. 123-137
  • L St. Clair, L Johansen, W Enck, M Pirretti, P Traynor, Patrick D McDaniel and T Jaeger, 2006, "Password Exhaustion: Predicting the End of Password Usefulness", pp. 37-55
  • Patrick D McDaniel, K Butler and S Qiu, 2006, "Testing Large Scale BGP Security in Replayable Network Environments"
  • K Butler, Patrick D McDaniel and S Qiu, 2006, "BGPRV: A Library for Fast and Efficient Routing Data Manipulation"
  • Wesam Lootah, William Enck and Patrick D McDaniel, 2005, "TARP: Ticket-based Address Resolution Protocol", pp. 95-103
  • Kevin R. B. Butler and Patrick D McDaniel, 2005, "Understanding Mutable Internet Pathogens, or How I Learned to StopWorrying and Love Parasitic Behavior", Springer-Verlag LNCS, 3803, (1), pp. 36–48
  • William Enck, Patrick Traynor, Patrick D McDaniel and Thomas F Laporta, 2005, "Exploiting open functionality in SMS-capable cellular networks", pp. 393–404
  • Louis Kruger, Somesh Jha and Patrick D McDaniel, 2005, "Privacy Preserving Clustering", Springer-Verlag LNCS, 3679, (1), pp. 397–417
  • Heesook Choi, William Enck, Jaesheung Shin, Patrick D McDaniel and Thomas F Laporta, 2005, "Secure Reporting of Traffic Forwarding Activity in Mobile Ad Hoc Networks", pp. 12–21
  • William Aiello, Charles R. Kalmanek, Patrick D McDaniel, Subhabrata Sen, Oliver Spatscheck and Jacobus E. van der Merwe, 2005, "Analysis of Communities of Interest in Data Networks", Springer-Verlag LNCS, 3431, (1), pp. 83–96
  • Ali Al-Lawati, Dongwon Lee and Patrick D McDaniel, 2005, "Blocking-aware private record linkage", pp. 59–68
  • , 2005, "Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings", Springer, 3679
  • , 2005, "Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings", Springer, 3803
  • , 2005, "IQIS 2005, International Workshop on Information Quality in Information Systems, 17 June 2005, Baltimore, Maryland, USA (SIGMOD 2005 Workshop)", ACM
  • , 2005, "Passive and Active Network Measurement, 6th International Workshop, PAM 2005, Boston, MA, USA, March 31 - April 1, 2005, Proceedings", Springer, 3431
  • , 2005, "Privacy Enhancing Technologies, 4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004, Revised Selected Papers", Springer, 3424
  • , 2005, "Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005", ACM
  • , 2005, "Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005", USENIX Association
  • M Pirretti, S Zhu, N Vijaykrishnan, Patrick D McDaniel, M Kandemir and R Brooks, 2005, "The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense"
  • A Al-Lawati, D Lee and Patrick D McDaniel, 2005, "Blocking in Private Information Matching", 59-68
  • Hao Wang, Somesh Jha, Patrick D McDaniel and Miron Livny, 2004, "Security Policy Reconciliation in Distributed Computing Environments", pp. 137-148
  • Simon Byers, Lorrie Faith Cranor, David P. Kormann and Patrick D McDaniel, 2004, "Searching for Privacy: Design and Implementation of a P3P-EnabledSearch Engine", pp. 314–328
  • , 2004, "Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004", ACM
  • S Byers, L F Cranor, E Cronin, D Korman and Patrick D McDaniel, 2004, "Exposing Digital Content Piracy: Approaches, Issues and Experiences"
  • Eric Cronin, Sugih Jamin, Tal Malkin and Patrick D McDaniel, 2003, "On the performance, feasibility, and use of forward-secure signatures", pp. 131–144
  • William Aiello, John Ioannidis and Patrick D McDaniel, 2003, "Origin authentication in interdomain routing", pp. 165–178
  • Simon Byers, Lorrie Faith Cranor, Eric Cronin, David P. Kormann and Patrick D McDaniel, 2003, "Analysis of security vulnerabilities in the movie production and distribution process", pp. 1–12
  • Patrick D McDaniel, 2003, "On context in authorization policy", pp. 80–89
  • Patrick D McDaniel and Atul Prakash, 2003, "A Flexible Architecture for Security Policy Enforcement", pp. 234–239
  • Jim Irrer, Atul Prakash and Patrick D McDaniel, 2003, "Antigone: Policy-based Secure Group Communication System and AMirD: Antigone-based Secure File Mirroring System", pp. 44–46
  • Geoffrey Goodell, William Aiello, Timothy Griffin, John Ioannidis, Patrick D McDaniel and Aviel D. Rubin, 2003, "Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing", pp. 75-85
  • Patrick D McDaniel and Atul Prakash, 2002, "Methods and Limitations of Security Policy Reconciliation", pp. 73–87
  • Hugh Harney, Andrea Colgrove and Patrick D McDaniel, 2001, "Principles of Policy in Secure Groups"
  • Patrick D McDaniel, A Prakash, J Irrer, S Mittal and T Thuang, 2001, "Flexibly Constructing Secure Groups in Antigone 2.0", pp. 55-67
  • Patrick D McDaniel and Sugih Jamin, 2000, "Windowed Certificate Revocation", pp. 1406–1414
  • Patrick D McDaniel and Aviel D. Rubin, 2000, "A Response to "Can We Eliminate Certificate Revocation Lists?"", pp. 245–258
  • William A. Adamson, Charles J. Antonelli, Kevin Coffman, Patrick D McDaniel and Jim Rees, 1999, "Secure Distributed Virtual Conferencing", pp. 176–190
  • Patrick D McDaniel, Atul Prakash and Peter Honeyman, 1999, "Antigone: A Flexible Framework for Secure Group Communication", pp. 99-114

Technical Reports

  • Nicolas Papernot, Patrick D McDaniel, Somesh Jha, Matt Fredrikson, Z. Berkay Celik* and Ananthram Swami, 2015, "The Limitations of Deep Learning in Adversarial Settings"
  • Wenhui Hu*, Damien Octeau*, Patrick D McDaniel and Peng Liu, 2014, "Duet: library integrity verification for android applications"
  • Devin J. Pohly*, Stephen E. McLaughlin*, Patrick D McDaniel and Kevin Butler*, 2012, "Hi-Fi: collecting high-fidelity whole-system provenance"
  • D. Octeau*, S. Jha and Patrick D McDaniel, 2011, "Retargeting Android Applications to Java Bytecode"
  • S. McLaughlin* and Patrick D McDaniel, 2011, "Protecting Consumer Privacy from Electric Load Monitoring"
  • Stephen E. McLaughlin*, Dmitry Podkuiko*, Adam Delozier*, Sergei Miadzvezhanka* and Patrick D McDaniel, 2010, "Multi-vendor penetration testing in the advanced metering infrastructure"
  • William Enck* and Patrick D McDaniel, 2010, "Federated Information Flow Control for Mobile Phones"
  • Joshua Schiffman, Thomas Moyer*, Hayawardh Vijayakumar, Trent R Jaeger and Patrick D McDaniel, 2010, "Seeding clouds with trust anchors"

Exhibition Catalogs

Other

  • Patrick D McDaniel, K. Butler, W. Enck, H. Hursti, S. McLaughlin, P. Traynor, M. Blaze, A. Aviv, P. Cerny, S. Clark, E. Cronin, G. Shah, M. Sherr, G. Vigna, R. Kemmerer, D. Balzarotti, G. Banks, M. Cova, V. Felmetsger, W. Robertson, F. Valeur, J. Lorenzo Hall and L. Quilter, 2007, "EVEREST: Evaluation and Validation of Election-Related Equipment, Standards and Testing", pp. 350
  • T Jaeger, Patrick D McDaniel, L St. Clair, R Caceres and R Sailer, 2006, "Shame on Trust in Distributed Systems"

Research Projects

  • September 2011 - August 2016, "TC: Medium: Collaborative Research: Building Trustworthy Applications for Mobile Devices," (Sponsor: National Science Foundation).
  • October 2012 - March 2014, "Secure Mobile Communications (SMC) Program," (Sponsor: Telcordia Applied Comm. Sciences).
  • March 2012 - February 2013, "Google Faculty Research Award: Plotting a Map of Android Inter-App Communication," (Sponsor: Google).
  • August 2011 - August 2012, "Managing Security and Vulnerability Risks in the Smart Grid," (Sponsor: Institute for CyberScience and The Penn State Institutes of Energy and the Enviro.).
  • December 2009 - November 2012, "NSF HECURA: Collaborative Research: Secure Provenance in High-End Computing Systems," (Sponsor: National Science Foundation).
  • August 2009 - July 2012, "TC: Medium: Collaborative Research: Security Services in Open Telecommunications Networks," (Sponsor: National Science Foundation).
  • August 2007 - July 2012, "CAREER: Realizing Practical High Assurance through Security-Typed Information Flow Systems," (Sponsor: National Science Foundation).
  • September 2009 - August 2012, "Collaborative Research: Secure Provenance in High-End Computing Systems," (Sponsor: NSF/CCF).
  • July 2008 - June 2012, "MRI Acquisition of A Scalable Instrument for Discovery through Computing," (Sponsor: National Science Foundation).
  • September 2007 - August 2010, "NeTS WN: Protecting Services for Emerging Wireless Telecommunications Infrastructure," (Sponsor: National Science Foundation).
  • January 2010 - December 2010, "Managing Security and Vulnerability Risks in the Smart Grid," (Sponsor: Institute for Cyberscience, Penn State Institutes of Energy & the Environment).
  • January 2010 - December 2010, "MSmart Grid Cyber Security Research," (Sponsor: Lockheed Martin).
  • May 2009 - May 2010, "Characterizing and Mitigating Wireless Systems Vulnerabilities," (Sponsor: DURIP/ARO).
  • September 2006 - August 2009, "CT-IS: Shamon: Systems Approaches for Constructing Distributed Trust," (Sponsor: NSF/CNS).
  • November 2008 - December 2009, "Utility Grid Automation and Risk," (Sponsor: Lockheed Martin).
  • November 2008 - November 2009, "Integrity Management for ICT Development," (Sponsor: Bell Labs Network Reliability & Security Office, Alcatel-Lucent).
  • October 2007 - January 2008, "EVEREST: Evaluation and Validation of Election-Related Equipment, Standards, and Testing," (Sponsor: The State of Ohio).
  • September 2007 - August 2008, "Security for Internet/IMS Convergence," (Sponsor: Cisco).
  • April 2005 - March 2006, "Student Travel Support for ACM SIGCOMM 2005 Conference," (Sponsor: NSF).
  • September 2005 - August 2006, "Testbed for Network-Scale Countermeasure Evaluation," (Sponsor: Cisco).
  • July 2005 - June 2006, "Extending Developer Tools for Security-typed Languages," (Sponsor: Software Engineering Research Center).
  • September 2004 - September 2005, "Collaborative Research: Next Generation Internet Security Mechanisms for Critical Applications-1 Y," (Sponsor: NSF).
  • August 2016 -  , "2017 SaTC PI Meeting," (Sponsor: National Science Foundation, (CNS)).
  • July 2016 -  , "TWC: Medium: Collaborative: Scaling and Prioritizing Market-Sized Application Analysis," (Sponsor: National Science Foundation, (CNS)).

Honors and Awards

  • IEEE Technical Committee on Security and Privacy Outstanding Community Service Award, IEEE Technical Committee on Security and Privacy, May 2016
  • Science of Security Index of Significant Research in Cyber Security, Science of Security Virtual Organization (SOS-VO), August 2015
  • ACM Fellow, Association for Computing Machinery, 2015
  • IEEE Fellow, Institute of Electrical and Electronics Engineers, 2014
  • Penn State Engineering Alumni Society Outstanding Research Award, Penn State Engineering Alumni Society, 2009
  • Best Paper Award, 2009 Annual Computer Security Applications Conference (ACSAC 2009), December 2009
  • Computer Engineering Faculty Marshall, College of Engineering Commencement Exercises, May 2009
  • Penn State Engineering Society Outstanding Research Award, April 2009
  • IEEE Technical Committee on Security and Privacy Outstanding Community Service Award, August 2008
  • Google Security and Product Safety Acknowledgement, Google, 2008
  • Commendation for Exceptional Leadership and Achievement, State of Ohio, August 2008
  • ACM Certificate of Meritorious Service, April 2007
  • CSE Faculty Teaching Award, March 2007
  • Best Student Paper Award, 22st Annual Computer Security Applications Conference (ACSAC), December 2006
  • Best Paper Award, 2005 Innovations and Commercial Applications of Distributed Sensor Networks Symposium (ICA DSN 2005), October 2005
  • Bang for the Buck Award, DARPA Dynamic Coalitions, April 2002
  • Kennedy Space Center Fellowship, National Aeronautics and Space Administration, September 1997 - August 2000
  • Elec. Eng. & Comp. Science Summer Fellowship Award, University of Michigan, June 1997
  • Dean's Citation for Perfect Academic Record, Ball State University, June 1991

Service

Service to Penn State:

  • Advisor, ACM, August 2006 - 2016
  • Chairperson, CSE Hiring Committee, August 2014 - July 2015
  • Member, Frontier Hiring Committee, 2014 - 2015
  • Member, Personnel Committee, August 2007 - July 2012
  • Member, IT Committee, August 2010 - July 2012
  • Member, IT & Lab Evaluation Committee, August 2009 - July 2010
  • Member, Software Security Committee, August 2005 - July 2010
  • Member, Publications Committee, August 2006 - July 2009
  • Member, Promotion and Tenure Committee, August 2007 - July 2008
  • Representative, The Technology Collaborative (Pennsylvania Economic Development Consortium), 2007 - 2008
  • Advisor, Undergraduate Honors Advising (CMPSC), August 2005 - July 2007
  • Member, Graduate Committee, August 2005 - July 2006
  • Member, Personnel Committee, August 2004 - July 2005
  • Member, Strategic Committee, August 2004 - July 2005
  • Member, Strategic Committee, August 2010
  • Member, IT Committee, August 2015
  • Member, Personnel Committee, August 2016
  • Member, Awards Committee, August 2016

Service to External Organizations:

  • Member, IEEE European Symposium on Security and Privacy, Program Committee, 2016
  • Chairperson, IEEE Computer Society Technical Committee on Security and Privacy, January 2014 - 2016
  • Member, IEEE European Symposium on Security and Privacy, Steering Committee, 2015
  • Member, IEEE Conference on Communications and Network Security (CNS), Program Committee, 2015
  • Member, ACM Workshop on Moving Target Defense (MTD), Program Committee, 2015
  • Member, International Symposium on Engineering Secure Software and Systems (ESSoS 2015), Program Committee, March 2015
  • Member, First ACM Workshop on Moving Target Defense (MTD 2014), Program Committee, November 2014
  • Chairperson, IEEE Symposium on Security and Privacy (SP 2014), IEEE Computer Society Technical Committee on Security and Privacy, May 2014
  • Member, Twenty-Third USENIX Security Symposium, Program Committee, August 2014
  • Organizer, Military Communications Conference (MILCOM 2014), Technical Panel, October 2014
  • Vice-ChairIEEE Computer Society Technical Committee on Security and Privacy, January 2012 - December 2013
  • Member, Twenty-Second USENIX Security Symposium, Program Committee, August 2013
  • Member, Third Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2013), Program Committee, November 2013
  • Member, Twentieth Annual Network & Distributed System Security Symposium (NDSS 2013), Program Committee, February 2013
  • Member, IEEE Symposium on Security and Privacy (SP 2013), Program Committee, May 2013
  • Member, Eighteenth Annual International Conference on Mobile Computing and Networking (MobiCom 2012), Program Committee, August 2012
  • Member, Program Committee, August 2012
  • Member, Twelfth Digital Forensics Research Workshop (DFRWS 2012), Technical Program Committee, August 2012
  • Member, Tenth Annual International Conference on Mobile Systems, Applications, and Services (MobiSys 2012), Program Committee, June 2012
  • Member, IEEE Symposium on Security and Privacy (SP 2012), Program Committee, May 2012
  • Member, Sixteenth International Conference on Financial Cryptography and Data Security (FC 2012), Program Committee, February 2012
  • Member, Nineteenth Annual Network & Distributed System Security Symposium (NDSS 2012), Program Committee, February 2012
  • Member, Program Committee, December 2011
  • Member, ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, in conjunction with CCS, Technical Program Committee, October 2011
  • Chairperson, Sixth USENIX Workshop on Hot Topics in Security (HotSec 2011), Technical Program Chair, August 2011
  • Member, ACM Symposium on Access Control Models and Technologies (SACMAT), Program Committee, June 2011
  • Member, IEEE Symposium on Security and Privacy, Program Committee, May 2011
  • Member, Seventeenth Annual International Conference on Mobile Computing and Networking (MobiCom 2011), Program Committee, September 2011
  • Member, Seventh International Conference on Information Systems Security (ICISS 2011), Program Committee, December 2011
  • Member, Twentieth International World Wide Web Conference (WWW 2011), Program Committee, March 2011
  • Member, Twenty-Second Computer Security Foundations Symposium (CSF 2011), Program Committee, July 2011
  • Member, Thirty-First International Conference on Distributed Computing Systems (ICDCS 2011), Technical Program Committee, June 2011
  • Member, Twenty-Sixth Annual Computer Security Applications Conference (ACSAC 26), Program Committee, December 2011
  • Member, Twenty-Sixth Annual Computer Security Applications Conference (ACSAC 26), Program Committee, December 2010
  • Member, Sixteenth Annual International Conference on Mobile Computing and Networking (MobiCom 2010), Program Committee, September 2010
  • Member, World Wide Web Conference (WWW 2010), Program Committee, April 2010
  • Member, ACM Symposium on Applied Computing (SAC), Information Security Research and Applications Track, Program Committee, March 2010
  • Member, ACM Cloud Computing Security Workshop (CCSW 2010), in conjunction with CCS 2010, Program Committee, October 2010
  • Committee Member, Fifth USENIX Workshop on Hot Topics in Security (HotSec 2010), Program Committee, August 2010
  • Member, Third USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 2010), Program Committee, April 2010
  • Member, IEEE Global Communications Conference (GlobeComm 2010), Program Committee, December 2010
  • Member, Fourteenth ACM Symposium on Access Control Models and Technologies (SACMAT 2009), Program Committee, June 2009
  • Member, First ACM SIGCOMM Workshop on Networking, Systems, Applications on Mobile Handhelds (MobiHand 2009), Program Committee, August 2009
  • Member, First ACM Workshop on Cloud Computing Security, Program Committee, November 2009
  • Chairperson, Workshop on Telecommunications Infrastructure Protection and Security (TIPS 2009), December 2009
  • Member, International Conference on Information Systems Security (ICISS), Program Committee, December 2009
  • Committee Member, Fourth USENIX Workshop on Hot Topics in Security (HotSec '09), Program Committee, August 2009
  • Co-Chairperson, USENIX Security Symposium, Invited Talks, August 2009
  • Member, Sixteenth Annual Network & Distributed Security Symposium (NDSS 2009), Program Committee, February 2009
  • Member, Sixteenth ACM Conference on Computer and Communications Security (CCS 2009), Program Committee, November 2009
  • Member, Twenty-First Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec '08), Program Committee, July 2008
  • Member, Thirteenth ACM Symposium on Access Control Models and Technologies (SACMAT 2008), Program Committee, June 2008
  • Member, Twelfth International Conference on Financial Cryptography and Data Security (FC 2008), Program Committee, January 2008
  • Committee Member, Program Committee, July 2008
  • Member, ACM Symposium on Information, Computer and Communications Security (ASIACCS'08), Program Committee, March 2008
  • Technical Program Co-ChairIEEE Symposium on Security and Privacy, May 2008
  • Member, ACM Conference on Computer and Communications Security (CCS 2008), Program Committee, October 2008
  • Founding General Co-ChairpersonFirst IEEE International Workshop on Security in Software Engineering (IWSSE 2007), in conjunction with COMPSAC 2007, July 2007
  • Committee Member, Program Committee, August 2007
  • Technical Program Co-ChairIEEE Symposium on Security and Privacy, May 2007
  • Member, International World Wide Web Conference, Security and Privacy Track, Program Committee, May 2007
  • Program Co-ChairThird International Conference on Information Systems Security (ICISS 2007), December 2007
  • Program ChairACM Conference on Computer and Communications Security, October 2007
  • Program ChairACM Conference on Computer and Communications Security (CCS 2007), October 2007 - November 2007
  • Committee Member, Program Committee, August 2007
  • Committee Member, Program Committee, August 2007
  • Member, The Five Nines Workshop on Designing and Managing High Availability Internet Services (INM 2007), in conjunction with ACM SIGCOMM, Technical Program Committee, August 2007
  • Member, Twelfth ACM Symposium on Access Control Models and Technologies (SACMAT 2007), Program Committee, June 2007
  • Member, Twenty-Sixth Annual IEEE Conference on Computer Communications (INFOCOM 2007), Program Committee, May 2007
  • Member, Twenty-First Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec '07), Program Committee, July 2007
  • Member, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), Program Committee, December 2007
  • Member, Third International Conference on Information Systems Security (ICISS 2007), Steering Program Committee, December 2007
  • Member, International Conference on Financial Cryptography and Data Security (FC), Program Committee, February 2007
  • Member, International Conference on Emerging Trends in Information and Communication Security (ETRICS 2006), Program Committee, June 2006
  • Member, First International Workshop on Security (IWSEC 2006), Program Committee, October 2006
  • Member, Fourth International Conference on Applied Cryptography and Network Security (ACNS), Program Committee, June 2006
  • Member, Twentieth Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec "06), Program Committee, July 2006
  • Member, Annual Computer Security Applications Conference (ACSAC 2006), Program Committee, December 2006
  • Member, Annual Computer Security Applications Conference (ACSAC), Program Committee, December 2006
  • Member, Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec '06), Program Committee, July 2006
  • Member, Eleventh ACM Symposium on Access Control Models and Technologies (SACMAT), Program Committee, June 2006
  • Member, SIGCOMM Workshop on Internet Network Management, Program Committee, September 2006
  • Member, Second IEEE ICNP Workshop on Secure Network Protocols (NPSec), Program Committee, November 2006
  • Member, Second International Conference on Information Systems Security (ICISS 2006), Program Committee, December 2006
  • Member, Second International Workshop on Security in Systems and Networks (SSN 2006), Program Committee, April 2006
  • Chairperson, Fifteenth USENIX Security Symposium (USENIX "06), Invited Talks, August 2006
  • Chairperson, USENIX Security Symposium (USENIX '06), Invited Talks, August 2006
  • Chairperson, Tenth International Conference on Financial Cryptography and Data Security (FC06), February 2006
  • Member, ACM Storage Security and Survivability Workshop, Program Committee, November 2006
  • Member, 2006 ACM Conference on Computer and Communication Security (CCS 2006), Program Committee, November 2006
  • Vice-ChairFourteenth International World Wide Web Conference (WWW 2005), May 2005
  • Member, Annual Computer Security Applications Conference (ACSAC 2005), Program Committee, December 2005
  • Member, First Workshop on Secure Network Protocols (NPSec 2005), Technical Program Committee, November 2005
  • Member, The 1st International Workshop on Systems and Network Security (SNS 2005), Technical Program Committee, April 2005
  • Member, Tenth European Symposium on Research in Computer Security (ESORICS 2005), Program Committee, September 2005
  • Member, Sixth ACM Conference on Electronic Commerce (EC 2005), Program Committee, June 2005
  • Member, Tenth ACM Symposium on Access Control Models and Technologies (SACMAT 2005), Program Committee, June 2005
  • Board Member, Encyclopedia of Cryptography and Security, September 2002 - May 2005
  • Member, Industry Track, Twelth ACM Conference on Computer and Communications Security (CCS 2005), Program Committee, November 2005
  • Member, First International Conference on Information Security (ICIS 2005), Program Committee, December 2005
  • Vice-ChairFourteenth International World Wide Web Conference (WWW 2005), Security and Privacy Track, May 2005
  • Member, Sixth ACM Conference on Electronic Commerce (EC 2005), Program Committee, June 2005
  • Member, Tenth ACM Symposium on Access Control Models and Technologies (SACMAT 2005), Program Committee, June 2005
  • Program ChairFifteenth USENIX Security Symposium, August 2005
  • Member, Tenth European Symposium on Research in Computer Security (ESORICS 2005), Program Committee, September 2005
  • Member, Twelfth ACM Conference on Computer and Communications Security (CCS 2005), Program Committee, November 2005
  • Member, Annual Computer Security Applications Conference (ACSAC 2005), Program Committee, December 2005
  • Session ChairTwentieth Annual Computer Security Applications Conference (ACSAC 2004), December 2004
  • Program Chair11th ACM Conference on Computer and Communications Security, October 2004
  • Member, 9th European Symposium on Research in Computer Security (ESORICS), Program Committee, September 2004
  • Committee Member, 14th USENIX Security Symposium, Program Committee, August 2004
  • Panelist, Abusable Technologies Awareness Center (ATAC), October 2013
 


 

About

The School of Electrical Engineering and Computer Science was created in the spring of 2015 to allow greater access to courses offered by both departments for undergraduate and graduate students in exciting collaborative research in fields.

We offer B.S. degrees in electrical engineering, computer science, computer engineering and data science and graduate degrees (master's degrees and Ph.D.'s) in electrical engineering and computer science and engineering. EECS focuses on the convergence of technologies and disciplines to meet today’s industrial demands.

School of Electrical Engineering and Computer Science

The Pennsylvania State University

209 Electrical Engineering West

University Park, PA 16802

814-863-6740

Department of Computer Science and Engineering

814-865-9505

Department of Electrical Engineering

814-865-7667